Detection of malicious nodes to avoid data loss in wireless networks using elastic routing table

2017 
Everyone comes under the problem, Security. Comparative to Wired network, wireless faces more problem and also it is inevitable. This paper deals how to reduce security issue and also to avoid traffic conjunction. Here, we explain how the misbehavior node is detected by the auditor in dynamic network. Auditing node is used to collect the information of each node and also used to select the trustworthy path to avoid the traffic conjunction and make the data more securable. To increase the security and speed we implement the clustering method. In that various types are used to increase the security, among those types fuzzy is one of them. In fuzzy we used binary method, which make more security in the wireless network.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    11
    References
    0
    Citations
    NaN
    KQI
    []